Sciweavers

1708 search results - page 200 / 342
» A methodology to design information retrieval systems (MDIRS...
Sort
View
WSC
2007
14 years 17 days ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
IRI
2007
IEEE
14 years 4 months ago
SRG: A Digital Document-Enhanced Service Oriented Research Grid
We describe a new framework for building a system that consists of tools and services for supporting Cyberinfrastructure based scientific research. This system, called the Semanti...
Geoffrey Fox, Ahmet Fatih Mustacoglu, Ahmet E. Top...
SEMWEB
2005
Springer
14 years 3 months ago
Oyster - Sharing and Re-using Ontologies in a Peer-to-Peer Community
In this poster, we present Oyster, a Peer-to-Peer system for exchanging ontology metadata among communities in the Semantic Web. Oyster exploits semantic web techniques in data re...
Raúl Palma, Peter Haase
CII
2007
88views more  CII 2007»
13 years 10 months ago
Benefits of an item-centric enterprise-data model in logistics services: A case study
The paper uses a case example to present a novel way of building enterprise information systems. The objective is to bring forth the benefits of an item centric systems design in ...
Mikko Rönkkö, Mikko Kärkkäinen...
RECSYS
2010
ACM
13 years 10 months ago
Interactive recommendations in social endorsement networks
An increasing number of social networking platforms are giving users the option to endorse entities that they find appealing, such as videos, photos, or even other users. We defin...
Theodoros Lappas, Dimitrios Gunopulos